Middle-East Journal of Scientific Research 24 (3): 980-985, 2016 ISSN 1990-9233 © IDOSI Publications, 2016 DOI: 10.5829/idosi.mejsr.2016.24.03.23190 Corresponding Author: Iniya Shree, Department of IT, Karpagam College of Engineering, Coimbatore, India. 980 Providing Biometrics Security for Load Balanced Cloud Data Storage Iniya Shree, C. Vijesh Joe, K. Narmatha and S. Shinly Swarna Sugi 1 1 1 2 Department of IT, Karpagam College of Engineering, Coimbatore, India 1 Department of CSE, Karpagam College of Engineering, Coimbatore, India 2 Abstract: Sensitive data to be stored in the cloud is to be prevented from unauthorized access. To perform this prevention the entire data is to be split into many partitions and the encrypted partition of files are stored in different services. Whenever the data is required to be accessed the parts are retrieved, combined and decrypted. Even though the unauthorized person retrieve’s all portions of the server, the retriever may not be aware of the data splitting technique used, nor the encryption algorithm used. The methodology is applied to compare a number of well-known data splitting techniques. In this approach a key of 128 bit that is generated from palm vein of the authorized user. By using that key, the user can decrypt the data. Distributed system is the one that determines the secure data storage in cloud environment. Even each server in the distributed system can be abstracted as storage node and data may be stored based upon the characteristics of the node. Also load balancing in storage of cloud data is also tried to be achieved with optimal power consumption. Key words: Encryption Data Splitting Techniques Biometric Cloud Storage Distributed system Palm vein INTRODUCTION provider and made available to customers over a network, typically the Internet. SaaS is becoming an increasingly Information security and privacy has become a vital prevalent delivery model as underlying technologies that issue that to be firmly store in cloud. Biometric supports for Web services and service-oriented recognition is one in every of the techniques for the architecture (SOA) mature and new developmental protection privacy because of its distinctive nature of approaches, such as Ajax etc... Meanwhile, broadband biometric traits like palm vein, fingerprints, etc…. service has become increasingly available to support user Cryptographic key generation from palm vein has gained access from more areas. SaaS is closely related to the ASP its quality because of its security purpose. Within the (application service provider) and on demand computing crypto logical technique the initial data is encoded by software delivery models. IDC identifies two slightly mistreatment key generated from palm vein so it's not in different delivery models for SaaS. The hosted application an exceedingly perceivable format for the attacker. The management (hosted AM) model is similar to ASP; a uploaded original data is split in too several elements and provider hosts commercially available software for so encrypted. The original data are often obtained by customers and delivers it over the Web. In the software decoding the encoded knowledge mistreatment identical on demand model, the provider gives customers network- key. Thus the privacy is well protected during this based access to a single copy of an application created approach. specifically for SaaS distribution. The hardware and Cloud Computing refers the applications given as software in the data center refers to as cloud. When services over the Internet and system software in the data service to Cloud is provided in a pay-as-you-go manner centers that helps in providing those services. These for the usage of public, it is referred to as a Public Cloud, services themselves are referred to as Software as a whereas the service that is being sold entirely is referred Service (SaaS) [1]. It is a software distribution model in to as Utility Computing [2]. Private Cloud refers to data which applications are hosted by a vendor or service centers of an organization or enterprise which shares data